lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 5 Jan 2010 16:47:25 +0100 From: Oleg Nesterov <oleg@...hat.com> To: Martin Schwidefsky <schwidefsky@...ibm.com> Cc: Roland McGrath <roland@...hat.com>, caiqian@...hat.com, Heiko Carstens <heiko.carstens@...ibm.com>, Jan Kratochvil <jkratoch@...hat.com>, linux-kernel@...r.kernel.org, linux-s390@...r.kernel.org, utrace-devel@...hat.com Subject: Re: s390 && user_enable_single_step() (Was: odd utrace testing results on s390x) On 01/05, Oleg Nesterov wrote: > > Anyway. I modified the debugging patch a bit: > > --- K/arch/s390/kernel/traps.c~ 2009-12-22 10:41:52.909174198 -0500 > +++ K/arch/s390/kernel/traps.c 2010-01-05 09:49:19.541792379 -0500 > @@ -384,6 +384,8 @@ void __kprobes do_single_step(struct pt_ > } > if (tracehook_consider_fatal_signal(current, SIGTRAP)) > force_sig(SIGTRAP, current); > + else > + printk("XXX: %d %d\n", current->pid, test_thread_flag(TIF_SINGLE_STEP)); > } > > static void default_trap_handler(struct pt_regs * regs, long interruption_code) > ------------------------------------------------------------------------------- Ah, please ignore. I guess TIF_SINGLE_STEP was already cleared by the caller in entry.S Oleg. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists